Ben Cole Executive Editor - TechTarget - SearchBusinessAnalytics blog SearchCompliance OPSEC (operational security) 18 Jul 2016 SearchCompliance Proposed payday loan regulation seeks additional consumer protections 29 Jun 2016 SearchCompliance Blockchain GRC: The innovation and regulatory balance 24 Jun 2016 SearchCompliance Verizon: Human error still among the top data security threats 24 Jun 2016 SearchCompliance Blockchain compliance raises questions of regulatory scope, intent 26 May 2016 SearchCompliance Big data intelligence increasingly a business, governance priority 12 May 2016 SearchCompliance Five reasons to invest in ISO 27001 and other security certifications 09 May 2016 IoT Agenda Business information governance adapts as new tech, IoT proliferates 20 Apr 2016 SearchCompliance Governance tactics to reduce cybersecurity vulnerabilities 07 Apr 2016 SearchCIO platform business model 30 Mar 2016 SearchCompliance Data governance for legal and regulatory compliance 29 Mar 2016 IoT Agenda Lack of precedent exacerbates IoT security challenges 18 Mar 2016 SearchMobileComputing What wearable computing devices mean for IT admins 11 Mar 2016 IoT Agenda IoT device security raises new data protection questions 10 Mar 2016 SearchCompliance Book excerpt: Achieving digital trust in the information age 07 Mar 2016 SearchCompliance Information security monitoring, analytics for the digital age 07 Mar 2016 SearchCIO systems of engagement 29 Feb 2016 SearchCompliance To protect corporate cybersecurity, don't ignore the data 25 Feb 2016 SearchCompliance Network growth complicating information security 19 Feb 2016 IoT Agenda The cyber risks of connected vehicle technology 17 Feb 2016 SearchCompliance Negligence, accidents put insider threat protection at risk 01 Feb 2016 SearchCompliance End-user security awareness first line of data protection defense 25 Jan 2016 SearchCIO demand shaping 20 Jan 2016 SearchCompliance Making the business case for cybersecurity spending 20 Jan 2016 IoT Agenda Chief IoT Officer (Chief Internet of Things Officer) 30 Dec 2015 SearchCompliance Reduce information security costs with smart strategy, personnel 30 Dec 2015 SearchCompliance Creating a 'culture of security' requires new look at business priorities 18 Dec 2015 SearchCompliance Cybersecurity and privacy compliance: The delicate balance 07 Dec 2015 SearchCompliance IT compliance management skills remain in high demand 02 Dec 2015 SearchCompliance Beyond BYOD: How new tech is driving digital information governance 18 Nov 2015 SearchCompliance Mobile application vulnerabilities remain a forgotten security threat 11 Nov 2015 SearchCompliance Information security processes and procedures vital to business success 06 Nov 2015 SearchCIO executive leadership 30 Oct 2015 SearchCompliance InfoSec professionals tapped to advance the 'culture of security' 09 Oct 2015 SearchCompliance predictive coding 30 Sep 2015 SearchCompliance Governance needs shift as digital evidence in court becomes common 29 Sep 2015 SearchCIO business model innovation 31 Aug 2015 SearchCIO A CIO's cybersecurity checklist; tech integration strategies and best practices 28 Aug 2015 SearchCompliance Information governance key to compliance automation success 27 Aug 2015 SearchCompliance Data governance in the digital age 25 Aug 2015 SearchCIO Leadership strategies for CIOs; latest breach puts spotlight on privacy 21 Aug 2015 SearchCIO Will data privacy finally come to the fore, post-Ashley Madison hack? 21 Aug 2015 SearchCIO value innovation 31 Jul 2015 SearchCompliance The data governance keys to successful GRC automation 24 Jul 2015 SearchCompliance Data governance due diligence key to GRC automation success 16 Jul 2015 SearchCIO MIT Sloan winner: 'Unity of effort' vital to digital transformation 02 Jul 2015 SearchCompliance Panel offers C-level temperature on security as IoT gains steam 12 Jun 2015 SearchCompliance Data as currency: Balancing risk vs. reward 05 Jun 2015 SearchCompliance Fresh look at governance required to maximize information as an asset 19 May 2015 SearchCIO IT project management 24 Apr 2015 SearchCompliance SEC oversight reaches new levels under Regulation SCI 17 Mar 2015 SearchCompliance agreed-upon procedures (AUP) 20 Feb 2015 SearchCompliance Keep security controls scalable, sustainable to adapt to new threats 05 Feb 2015 SearchCompliance New risk management needs challenge information governance processes 30 Jan 2015 SearchCompliance Why flexibility tops list of must-have information security skills 29 Jan 2015 SearchCompliance Why your mobile device management policy must include wearables 14 Jan 2015 SearchCompliance Fast-advancing tech makes information security threats tough to grasp 14 Jan 2015 SearchCompliance COMSEC (communications security) 08 Dec 2014 SearchCompliance Altman Z-score 08 Dec 2014 SearchCompliance RIM likely to lead strategy as privacy compliance becomes a priority 04 Dec 2014 SearchCompliance Governance and analytics reduce big data risk, boost information value 20 Nov 2014 SearchCompliance Certified Information Systems Risk and Compliance Professional (CISRCP) 20 Oct 2014 SearchCompliance records retention schedule 24 Sep 2014 SearchCompliance information assurance 28 Aug 2014 SearchCompliance International Accounting Standards Board 25 Aug 2014 SearchCompliance IT Governance Institute (ITGI) 08 Jul 2014 SearchCompliance Can automated segregation of duties benefit regulatory compliance? 24 Jun 2014 SearchCompliance IT audit (information technology audit) 17 Jun 2014 SearchCompliance VAL IT (value from IT investments) 16 Jun 2014 SearchCompliance Next generation of threats requires new approach to PCI security 16 May 2014 SearchCompliance systemic risk 13 May 2014 SearchCompliance speculative risk 17 Apr 2014 SearchCompliance Center for Internet Security (CIS) 27 Mar 2014 SearchCompliance risk exposure 27 Mar 2014 SearchCompliance Government Accountability Office (GAO) 17 Feb 2014 SearchCompliance EDRM (electronic discovery reference model) 13 Jan 2014 SearchCompliance GRC professionals' salaries increase as demand for their skills rises 20 Dec 2013 SearchCompliance FASAB (Federal Accounting Standards Advisory Board) 13 Dec 2013 SearchCompliance privacy impact assessment (PIA) 13 Dec 2013 SearchCompliance ISO 27002 (International Organization for Standardization 27002) 14 Nov 2013 SearchCompliance Senate Judiciary Committee (SJC) 13 Aug 2013 SearchCompliance electronically stored information (ESI) 13 Aug 2013 SearchCompliance The final differentiators to consider when choosing a GRC solution 19 Jul 2013 SearchCompliance Big data era requires new approach to information governance strategy 15 Jul 2013 SearchCompliance U.S. Department of Homeland Security (DHS) 11 Jul 2013 SearchCompliance Risk management, bottom-line benefits from records retention schedules 27 Jun 2013 SearchCompliance Basel Committee on Banking Supervision (BCBS) 21 Jun 2013 SearchCompliance audit log (AL) 21 Jun 2013 SearchCompliance access list (AL) 06 May 2013 SearchCompliance AICPA (American Institute of Certified Public Accountants) 03 May 2013 SearchCompliance Eight principles of information governance and risk management 15 Apr 2013 SearchCompliance FPCA (Foreign Corrupt Practices Act) 06 Mar 2013 SearchCompliance Video Privacy Protection Act of 1988 19 Dec 2012 SearchCompliance whistleblower 27 Nov 2012 SearchCompliance compliance burden 29 Oct 2012 SearchCompliance NERC CIP (critical infrastructure protection) 16 Jul 2012 SearchCompliance Developers: Unified Compliance Framework helps organize GRC processes 13 Jul 2012 SearchCompliance A decision maker's guide to organizational records management strategy 28 Jun 2012 SearchCompliance Computer Fraud and Abuse Act (CFAA) 06 Jun 2012 SearchCompliance As GRC technology becomes more complex, so do buying decisions 14 May 2012 1 2 3